Risk analysis HW

ASSIGNMENT, ENGINEERING AND CONSTRUCTION RISK ANALYSIS HW By: Introduction It is important to highlight that this paper delves in the discussion of risk analysis. Risks are the contingencies that can be met at unknown time during the course of work. They can be as a result of accidents or even incompetency (Charles, 2011).
1) The challenges/difficulties of existing methods in handling data Incompleteness and heterogeneity
There are various challenges that exist in the handling of voluminous data and these are explained explicatively as shown below:
Heterogeneity:- handling of data of various components is quite sophisticated. In n organization, you are likely to find many departments and this will call for the integration of the reports or data from all the departments. This can range from the data of the previous years being accessed. This is quite tedious and calls for proper documentation and competent staff to allow for the quick and easy retrieval of information (Charles, 2011).
Data complexity:-unstructured data are hard to handle and is triggered mostly by the various ways of generating data such as images and videos. From various sources such as tablet or smartphones and that they are hard to process because they are unstructured (Charles, 2011).
Storage and publishing:- the storage o large amounts of data require large storage capacity and large storage distribution system which supports the given network used in the data analysis, storage and transfer (Charles, 2011).
2) a generally applicable analysis framework with appropriate new technique innovations, which can carry out system level risk analysis accounting for data incompleteness and heterogeneity, regardless the system logic structure.
In the developing of the framework, it is important to consider the volume of data and the speed required in retrieval. The framework is therefore explained as shown below:
i. Collective new information using the new developed computer software
ii. Grouping the data collected and then scanning them to prevent infection of the other data available
iii. Processing the data and then storing them in the computer system.
iv. The different sets of data should be put into different category to prevent the possibility of mixing the data collected.
3) The application of the framework on hardware systems, software systems, as well as human activities in complex systems.
The system will be quite effective if the various components are protected from moisture and dust so that they do knock during the operations of the system. They should as well be cleaned regularly using the recommended wipe so that they do not get moisturized. Various soft wares should be installed into the system Justas the framework highlights so that the data processing is speeded up and there should be a lot of interlinking the departments in an organization. In this, there is need to have intranet and internet connectivity within an organization with a lot of e-filing being done for quick retrieval and safety storage. The installed software will make complex operations to seem lighter and they will be efficient. The staff that should be in operation should possess the desired skills and knowledge on computerization and technology so that the data are not mishandled due to incompetency.
The figure below illustrates on risks probability of risk occurring to the system with the impact on the system (Charles, 2011).
Charles, Y., (2011), Principles of Risk Analysis:&nbsp.Decision Making Under Uncertainty, Boston, CRC Press